Can you hack-proof yourself?

You can hack-proof yourself and outsmart scammers by practising good cyber security hygiene
Man in kung fu pose holding smartphone

Just as you can’t be resistant to ever-mutating viruses, you can’t be fully immune to ever-evolving scam attacks. However, you CAN get better at outsmarting hackers by practising our three-step Hacker Block


Cheaters and tricksters go by many names. There are the grifters, con artists, fraudsters and scammers, and even the quite-dignified social engineers. In the context of cyber hygiene and security, we’ll go with the clear and simple – hackers. And what would their modus operandi be? The two-pronged attack. They hack human nature – the instinct to be trusting and accommodating – and they hack online systems for private information.


Traps via channels like SMS and email are framed to target people for their giving, conforming nature. This also means that if you’re alert and discerning enough to spot them, the ruses fail. So, how do you do this? Follow our simple three-step Hacker Block, loosely inspired by kung fu moves. Remember, practice makes perfect!


The three-step Hacker Block

To stay out of harm’s way – aka not become the loophole that cyber criminals are ready to exploit – it’s best to keep a cyber hygiene regimen. Here are the steps to follow:

1. Unleash the "dragon": Don’t take things at face value

This kung fu move is about being intimidating and staring at your opponent with hard, cold eyes. In the outsmart-the-hacker version of this move, you keep your eyes peeled for traps planted by your attacker.

Hackers create a false sense of security to lure people in. In emails, SMS, texts, social media posts, and websites, they’re prone to using spoofed details. This includes the names and logos of well-known brands, as well as sender addresses and caller IDs seemingly linked to known entities. They do this to create the illusion of trusted contacts.

Hackers may be great at planting digital potholes, but they often lack finesse when it comes to the finer details. Think spelling and grammatical mistakes, missing or additional spaces and punctuation, design errors and more.

If you keep a keen eye each time you open a new message, there’s a high chance you’ll pick out these traps before you can even get to tapping ‘delete’.


2. Be like a monkey in a tree: Look at the big picture

This move is about shifting your stance so that you get a better view of your opponent. Take a step back to survey the playing field.

Hackers aim to stir urgency and raise alarm with their messages. If a piece of correspondence brings up unsettling emotions and makes you want to act on instructions given (i.e. “You’ve been phished! Tap on the link to deactivate your credit card now!”), that’s a sure sign that you need to take pause and reassess the situation. Questions to ask yourself include, “Am I sure about who they say they are?”, “Was I expecting contact from this person or entity?” and “What would the repercussions be if this were a hacking attack and I fell for it?”.

In another scenario, if you sense something amiss but can’t put your finger on it, you may take some precautionary steps. Verify the source of the message in a separate browser window or call a friend or colleague to ask if they’ve recently encountered a similar correspondence. The latter step is also useful for getting extra eyes on suspicious material.

A healthy dose of skepticism could go a long way. When you tread carefully, you protect yourself and the institutions you work with (i.e. banks, insurance, etc.). And when you top that off with awareness – being calm, confident and knowing when you act on any requests – you can become hack-proof.


3. Launch forward in the heron stance: Going on the offense may be your best defence

And finally, this move is simply to land a blow – an uppercut or a punch in the solar plexus – to K.O. the attacker.

Hackers may be closet psychologists – they understand that most people are unconfrontational and use that trait to their advantage. This is more apparent where physical contact is involved. For example, shoulder surfing (or peering) while an unknowing person enters personal information into a computer, smartphone or financial terminal, or invading someone’s personal space to eavesdrop on private conversations. They can steal confidential information in these instances, especially when a person’s guard is down.

Coming out of your comfort zone – saying "no" – or going on the offense (i.e. being in-the-know about the latest tricks and scams, so that you instinctually turn away dubious people, deals and discounts) could help form an impenetrable wall between you and a hacker.


And that’s how we empower you to cast out the baddies!



Two parting tips

Now that you know how to stay safe from predators behind scam emails and messages, here’s how to hang up on dodgy callers

● Make use of checking tools. Utilise call-blocking apps, reverse search engines and trusted online databases of spoofed numbers.

● Be wary when answering incoming calls. Numbers starting with “+65” are a giveaway – this is a common tactic used by scammers to make spoofed calls appear legitimate. If answered, automated voice messages (a second red flag!) requesting for personal information are likely to follow. 

… you’re welcome!                

Enjoy reading our articles?

Subscribe to Money Banter to receive useful tips and guides on insurance and offers on products and services.

Thank you for your submission. 

By clicking “Submit”, you consent to Singapore Life Ltd. (“Singlife”) and Singlife related companies contacting you to provide you with information concerning Singlife and Singlife related companies’ products and services and special offers which may be of interest to you.
For details of Singlife's Data Protection Policy, please refer to singlife.com/pdpa. To withdraw your consent at any time, please call Singlife at +65 6827 9933.

Important Information

Money Banter (the "Portal") is for general information only and does not take into account the specific investment objectives, financial situation, health condition and needs of any particular person. The contents of this Portal are intended merely for educational purposes and should not be construed as the giving of advice or the making of a recommendation. Nothing contained in this Portal shall constitute a distribution, an offer to sell or the solicitation of an offer to buy. We recommend that you discuss any specific matters with your financial adviser representative or legal adviser before making any decision. You are responsible for your own medical care, treatment and oversight, and any health-related content on this Portal, including, text, treatments, dosages, outcomes, charts, profiles, graphics, images, messages and forum postings are strictly information to promote general understanding of certain health topics only, do not constitute the providing of medical advice, and should not be relied upon as a substitute for professional medical advice, diagnosis or treatment. Always seek advice from a physician or other qualified health care provider regarding your medical condition or treatment and before undertaking a new health care regimen. This Portal may include information sourced from third parties and links to third party websites. We are not responsible for the accuracy or completeness of, and do not recommend or endorse such information or third party websites nor recommend or endorse any specific tests, physicians, products, procedures, opinions or other information. While we have taken reasonable care to ensure that the information on this Portal has been obtained from reliable sources and is correct at time of publishing, information may become outdated and opinions may change. Except to the extent prohibited by any law, we are not liable for any loss (including direct, indirect and consequential loss, loss of profits, loss or corruption of data or economic loss of any kind) that may result from the access or use of or reliance on the information on this Portal.  | Terms of Use | Data Protection Policy

Protected up to specified limits by SDIC. This advertisement has not been reviewed by the Monetary Authority of Singapore.